WO2020114279A1 - Procédé et appareil de transfert de certificat de dette, dispositif électronique et support de stockage - Google Patents

Procédé et appareil de transfert de certificat de dette, dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2020114279A1
WO2020114279A1 PCT/CN2019/120957 CN2019120957W WO2020114279A1 WO 2020114279 A1 WO2020114279 A1 WO 2020114279A1 CN 2019120957 W CN2019120957 W CN 2019120957W WO 2020114279 A1 WO2020114279 A1 WO 2020114279A1
Authority
WO
WIPO (PCT)
Prior art keywords
account address
creditor
target
address
transfer
Prior art date
Application number
PCT/CN2019/120957
Other languages
English (en)
Chinese (zh)
Inventor
郭锐
蔡弋戈
李茂材
秦青
张建俊
王宗友
唐子超
尚庆正
杨晨
孔利
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2020114279A1 publication Critical patent/WO2020114279A1/fr
Priority to US17/231,471 priority Critical patent/US11978115B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This application relates to the field of blockchain technology, and in particular to a method, device, electronic equipment, and storage medium for transferring creditor's rights.
  • blockchain technology is used in more and more fields, for example, in the fields of finance, information security, computing resource sharing, entertainment, social networking, supply chain management, or medical treatment. widely used.
  • a supplier may hold a credit certificate.
  • the core enterprise corresponding to the credit certificate needs to pay the supplier the amount in the credit certificate.
  • the supplier can also transfer the credit certificate to other institutions, for example, the supplier can transfer it to the superior supplier, or the supplier can discount the credit certificate to transfer it to the financial institution, and Get the corresponding funds.
  • After the supplier applies for the transfer of the credit certificate it usually takes a while for the upper-level supplier or financial institution to confirm the signing. Therefore, a method of transferring the credit certificate is urgently needed to ensure the safety of the credit certificate transfer process and guarantee Transfer the rights of both parties.
  • a method for transferring creditor's rights includes:
  • Target account address is the temporary account address used to store the creditor's right certificate
  • the creditor's right certificate is transferred from the target account address to the creditor account address.
  • a credit certificate transfer device includes:
  • a generating module configured to generate a target account address based on the debtor account address and the creditor account address in the transfer request for creditor's right certificate, the target account address being the temporary account address used to store the creditor's right certificate;
  • a transfer module configured to transfer the credit certificate corresponding to the credit certificate transfer request from the debtor account address to the target account address
  • the transfer module is further configured to transfer the credit certificate from the target account address to the creditor account address based on the confirmation instruction of the creditor account address.
  • An electronic device includes a processor and a memory, and the memory stores at least one computer-readable instruction, the computer-readable instruction is loaded by the processor and performs the following steps:
  • Target account address is the temporary account address used to store the creditor's right certificate
  • the creditor's right certificate is transferred from the target account address to the creditor account address.
  • a non-volatile computer-readable storage medium stores at least one computer-readable instruction.
  • the computer-readable instruction is loaded by a processor and performs the following steps:
  • Target account address is the temporary account address used to store the creditor's right certificate
  • the creditor's right certificate is transferred from the target account address to the creditor account address.
  • FIG. 1 is an implementation environment of a method for transferring a creditor’s right certificate provided by an embodiment of the present application
  • FIG. 2 is an implementation environment of a method for transferring a creditor’s right certificate provided by an embodiment of the present application
  • FIG. 3 is an application scenario of a method for transferring a creditor’s right certificate provided by an embodiment of the present application
  • FIG. 4 is a flowchart of a method for transferring creditor's rights certificates provided by an embodiment of the present application
  • FIG. 5 is a schematic diagram of a target account address generation process provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a process of transferring creditor’s rights certificates provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a process of transferring creditor’s rights certificates provided by an embodiment of the present application.
  • FIG. 8 is a flowchart of a method for transferring creditor's rights certificates provided by an embodiment of the present application.
  • FIG. 9 is a flowchart of a method for transferring a creditor's right certificate provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a credit certificate transfer device provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the implementation environment may include multiple electronic devices, each of which may be a terminal or a terminal.
  • the multiple electronic devices may be multiple node devices in the blockchain system.
  • the multiple electronic devices may also include electronic devices outside the blockchain system and multiple node devices in the blockchain system.
  • the embodiment of the present application does not limit the specific implementation method.
  • the method for transferring creditor's rights certificates provided in the embodiments of the present application is mainly described by applying the method to node devices in a blockchain system.
  • the multiple electronic devices in the blockchain system may be multiple node devices of the same organization, or may belong to different organizations.
  • the multiple electronic devices may all belong to a financial institution, and the multiple electronic devices may belong to different departments of the financial institution, or one or more of the electronic devices may be user devices, and one or more of the electronic devices may belong to a financial institution.
  • other electronic devices may also belong to other organizations, for example, asset management organizations.
  • the embodiments of the present application are not listed here one by one.
  • the multiple electronic devices may correspond to different institutions, for example, core enterprises, suppliers, asset management institutions, financial institutions, or other institutions that have contractual relationships with financial institutions.
  • an asset management platform may be deployed on the equipment of the asset management institution, and the equipment of the financial institution or other institutions that have a contractual relationship with the financial institution may be a resource transfer device.
  • the asset management platform can review the credit certificate generation request or the credit certificate transfer request submitted by the supplier, and generate the credit certificate when the verification is passed, and the asset management platform can also work together with the resource transfer equipment to realize the expiration of the credit certificate
  • the resource transfer is based on the credit certificate.
  • the new credit certificate can also have certain generation conditions when it is generated. For example, a certain amount of resource transfer is required before the new credit certificate can be used or effective.
  • the resource transfer device can maintain resource information of multiple account addresses, and can also transfer resources to account address resources.
  • the resource transfer device can also be a resource transfer device.
  • the resource transfer device can be provided by a financial institution.
  • the resource transfer interface implements the resource transfer function.
  • the asset management platform may send a resource transfer request to the resource transfer device, and the resource transfer device provides the resource transfer service for the asset management platform.
  • the equipment where the asset management platform is located and the resource transfer equipment can be node equipment in the blockchain system
  • the core enterprise equipment and supplier equipment can be node equipment in the blockchain system.
  • the core The equipment of the enterprise and the equipment of the supplier may also be node equipment outside the blockchain system, which is not limited in the embodiments of the present application.
  • the asset management platform can be deployed on one electronic device or distributed on multiple electronic devices, for example, the asset management platform can be deployed on one server or one On the server cluster, the following is referred to as the device where the asset management platform is located, which is not specifically limited in the embodiments of the present application.
  • a CA center (Certificate Authority) can be configured in the blockchain system to store the keys of various institutions, and each electronic device in the blockchain system can Obtain the key of each organization from the CA center to carry out the process of information encryption and decryption.
  • the claim certificate mentioned in the method for transferring a claim certificate may be a digital asset.
  • the claim certificate usually has an expiration time.
  • the debtor may transfer the resources in the claim certificate to the creditor.
  • the process of generating credit vouchers can be as follows:
  • the first account address submits the request, and the blockchain system generates the first creditor's certificate for the second account address when the right is confirmed.
  • the first credit certificate is used to indicate that the first resource at the second account address is transferred to the first account address at the time of expiration.
  • the credit certificate can be a digital asset held to maturity business, and the supplier can hold the credit certificate.
  • the core enterprise can pay the supplier the money in the credit certificate, so
  • the credit certificate is an electronic confirmation letter, that is, the account receivable held by the supplier after the core enterprise confirms the right.
  • the first-tier supplier applies for 1 million digital assets
  • the blockchain system issues the 1 million digital assets with the core company's right confirmed.
  • the 1 million digital assets are the first credit certificate .
  • the supplier can also transfer part or all of the creditor's certificate to other institutions during the period of holding the creditor's certificate, for example, it can be transferred to the superior supplier or financial institution.
  • the transfer process of the credit certificate may have different methods, which may include the following two types:
  • the first account address submits a request based on the first claim voucher
  • the blockchain system generates a second claim voucher for the third account address.
  • the second claim voucher is used to indicate that the first The second resource in the first resource of the account address is transferred to the third account address. That is, the first account address transfers part or all of the resources in the held credit certificate to the third account address.
  • the first account address is the creditor account address
  • the third account address is the debtor account address.
  • a Tier 1 supplier (S1) holds 1 million digital assets of a core enterprise, and the 1 million digital assets are credit certificates.
  • the Tier 1 supplier will allocate 500,000 of the 1 million digital assets If the digital asset is transferred to the second-tier supplier (S2), the second-tier supplier holds another claim certificate of the first-tier supplier. The two claim certificates are related. The claim certificate held by the second-tier supplier is 500,000 digital assets transferred above.
  • the above process is as follows: the primary supplier transfers the second credit certificate to the secondary supplier.
  • the first account address or the third account address submits a request based on the held credit certificate, and the blockchain system generates a third credit certificate, which is used to indicate that the first credit card
  • the third resource in the resource or the second resource is transferred to the fourth account address.
  • the fourth account address needs to transfer the fourth resource to the first account address or the third account address to obtain the third credit certificate.
  • the fourth account address is the creditor account address
  • the first account address or the third account address is the debtor account address.
  • the third creditor's right certificate is available and valid.
  • the first-tier supplier and the second-tier supplier can discount the digital assets they hold. This discounting process is also a process of transferring the credit certificate.
  • the supplier can transfer part or all of the resources in the held credit certificate.
  • a financial institution or other institution that has a contractual relationship with a financial institution, and that financial institution or other institution with a contractual relationship with a financial institution may charge a discounted fee to pay the supplier less than the share of the transferred digital assets, Thus, the transferred creditor's rights certificate can be held.
  • the second-tier supplier holds 500,000 digital assets from the first-tier supplier and applies to a factoring company or bank to discount 200,000 digital assets from the 500,000 digital assets.
  • the factoring company or Banks can charge a certain discount fee, such as 14,000 digital assets, when the factoring company or bank determines to sign the 200,000 digital assets, it can pay 186,000 funds to the secondary supplier. The funds are not paid in the future. It is the current payment to the secondary supplier, so that the factoring company or bank can hold the 200,000 digital assets, and the 200,000 digital assets are available and effective.
  • the transfer method of the credit certificate is only exemplified in two ways.
  • the credit certificate may also include other transfer methods, which is not limited in the embodiments of the present application.
  • the specific processes for the transfer of the two types of debt vouchers described above are described below through the embodiments shown in FIGS. 4 and 9, respectively.
  • the embodiment shown in FIG. 4 corresponds to the second method
  • the embodiment shown in FIG. 9 corresponds to the first a method.
  • FIG. 4 is a flowchart of a method for transferring a creditor’s right certificate provided by an embodiment of the present application.
  • the method for transferring a creditor’s right certificate can be applied to an electronic device, which can be a node device in a blockchain system.
  • the electronic device may be the device where the asset management platform is located.
  • the method of transferring creditor's rights can include the following steps:
  • the electronic device receives a request to transfer a credit certificate.
  • the electronic device may provide a credit certificate transfer service.
  • the electronic device can receive a credit certificate transfer request, and according to the credit certificate transfer request, transfer the credit certificate to the credit certificate corresponding to the credit certificate transfer request, so as to realize the above credit certificate transfer service.
  • the credit voucher transfer request may include the debtor account address and the creditor account address.
  • the credit voucher transfer request may also include the expiration time of the credit voucher and the resources to be transferred corresponding to the credit voucher transfer request.
  • the credit certificate corresponding to the credit certificate transfer request may be the existing credit certificate at the address of the debtor's account.
  • the second-tier supplier holds 500,000 digital assets of the first-tier supplier, and the second-tier supplier wants to discount the 500,000 digital assets, that is, wants to transfer the 500,000 digital assets to the bank Or factoring company, and accordingly, the bank or factoring company pays less than 500,000 to the secondary supplier due to the need to charge a certain discount fee.
  • the 500,000 digital assets are the existing creditor's rights certificates of the debtor's account address.
  • the credit certificate corresponding to the credit certificate transfer request may be a new credit certificate generated based on the existing credit certificate of the debtor's account address.
  • the second-tier supplier holds 500,000 digital assets of the first-tier supplier, and the second-tier supplier wants to discount the 200,000 digital assets of the 500,000 digital assets, that is, wants to convert 200,000 digital assets.
  • the assets are transferred to the bank or factoring company, and accordingly, the bank or factoring company pays less than 200,000 funds to the secondary supplier due to the need to charge a certain discount fee, for example, 186,000.
  • the 200,000 digital asset is a new credit certificate generated based on the existing credit certificate.
  • the electronic device generates the target account address according to the debtor account address and the creditor account address in the request for transferring the credit certificate.
  • the target account address is a temporary account address used to store creditor's rights vouchers.
  • the target account address can be regarded as the intermediate account address of the debtor account address and the creditor account address.
  • the creditor's right certificate can be temporarily stored through the intermediate account address, so that the creditor's right
  • the voucher needs to be transferred, but within the time period when the creditor's account address is not signed, it can be guaranteed that the creditor's certificate will not be transferred repeatedly.
  • it can also ensure that the creditor account address will not be processed further before the creditor account address is signed, so that the target account address can protect the credit certificate transfer process. Security to protect the rights of both parties.
  • both parties to the transfer may have the right to perform resource processing on the target account address.
  • multi-signature technology can be used by multiple parties to jointly manage assets and can also be used for third-party transaction guarantees. That is, it can support multiple parties to jointly manage assets at the same address.
  • the multi-signature technology can be MN's multi-signature technology, which can also be called M of N mode, where M is the number of private keys required to unlock the address at least, and N is the number of managers holding the private key .
  • MN's multi-signature technology which can also be called M of N mode, where M is the number of private keys required to unlock the address at least, and N is the number of managers holding the private key .
  • M the number of private keys required to unlock the address at least
  • N is the number of managers holding the private key .
  • the value range of M is [1,16]
  • the value range of N is [1,N].
  • the general model includes 1 of 2, 1, 1 of 2, 2, 1 of 3, 2 of 3, 3 of 3, where 1 of 3 can mean that any of the three managers can handle the assets of the address individually; 2 of 3 can indicate that the three managers must have two parties to sign in order to process the assets at the address; 3 Of Of 3 can indicate that the three managers must all sign to process the assets at the address.
  • a multi-signature technology of 1-2 may be adopted, that is, two pairs of keys are generated for the target account address, and the two pairs of keys may include two private keys and two public keys.
  • M 1
  • M 1
  • the public key needs to be the public key corresponding to the private key used for locking.
  • the two private keys can then be held by both parties to the transfer of the above-mentioned credit certificate. In this way, both the debtor account and the creditor account can process the resources in the address of the target account.
  • the terminal may also generate two private keys and a public key for the target account address, and the public key may be used to unlock information locked by any one of the two private keys.
  • the application embodiment specifically adopts, and the values of M and N when adopting the multi-signature technology are not specifically limited.
  • the process of generating the target account address by the electronic device may include multiple ways.
  • the electronic device may transfer the account addresses of both parties according to the credit certificate to generate the public key of the target account address, thereby generating the target account address according to the public key.
  • the process of the electronic device generating the target account address may be implemented through the following steps one and two:
  • Step 1 The electronic device may generate the public key of the target account address based on the public key of the debtor account address and the public key of the creditor account address.
  • both parties to the transfer may have the right to perform resource processing on the target account address
  • the electronic device may use the public key of the debtor account address and the creditor account address.
  • the public key is used as the public key of the target account address. That is, the target account address includes two public keys, one of which is the public key of the debtor's account address, and the other public key is the public key of the creditor's account address. In this way, the electronic device can use one of the two public keys to decrypt the private key when receiving the processing instruction for the target account address encrypted by the private key. As long as one of the public keys is used to decrypt the processing instruction successfully.
  • the private key may also be referred to as a private key signature. Subsequent signatures based on the private key may also be used to know which party sent the processing instruction, so as to know which party initiated the processing.
  • the processing instruction needs to be encrypted based on the above two private keys, and the electronic device can process the target account address only when the two public keys are used to decrypt it successfully. That is, the processing instruction needs to carry the private key signature of the above debtor account address and creditor account address.
  • the embodiment of the present application does not limit which method is specifically adopted.
  • the public key of the target account address may also be one.
  • the electronic device may also generate a new public key based on the two public keys.
  • the electronic device can decrypt the processing instruction through the new public key to obtain the specific content of the processing instruction.
  • Step 2 The electronic device generates an account address of the target account address based on the public key of the target account address.
  • the electronic device may calculate the public key of the target account address by using a one-way hash function to obtain the account address of the target account address.
  • the embodiment of the present application generates the account address There is no restriction on which hash function is used. In this way, through the first step and the second step, the electronic device generates the target account address, and through the public key of the target account address, it can be determined that the processing authority of the target account address is the transfer parties.
  • the electronic device can first generate the target account address, and considering the processing authority of the target account address, it can also set a public key for the target account address based on the public key of the debtor account address and the public key of the creditor address.
  • the process of the electronic device generating the target account address may be implemented through the following steps one and two:
  • Step 1 The electronic device generates the target account address in the blockchain system.
  • step one the public key of the target account address has not yet been distributed, so the electronic device can first generate an account address, the target account address can have certain generation rules, and the electronic device can generate the target account address according to the generation rules .
  • the generation rule may be set by relevant technical personnel, which is not limited in the embodiments of the present application.
  • Step 2 The electronic device generates the public key of the target account address based on the public key of the debtor account address and the public key of the creditor account address.
  • Mr. Electronic Device becomes the target account address, so that based on the public key of the debtor account address and the creditor account address, a public key is assigned to the target account address, and the public key can also make the processing of the target account address
  • the authority is both the above-mentioned debtor account address and creditor account address.
  • the process of step 402 may be: generating an intermediate account for supplier A and financial institution A, the intermediate account is the target account address, and the target account address is the multi-signature address, specifically, electronic
  • the device can use the public keys of supplier A and financial institution A to make a multi-signature address.
  • the processing authority of the generated target account address is the above-mentioned debtor account address and creditor account address, that is, it can indicate that other account addresses cannot perform the target account address deal with.
  • the electronic device may decrypt the target processing instruction based on the public key of the target account address. If the decryption fails, the target processing instruction is determined to be based on the division For the instruction of encrypting the private key of the creditor account address and the account address other than the debtor account address, the electronic device can ignore the target processing instruction. In this implementation, the target processing instruction is not the processing instruction of the above-mentioned debtor account address and creditor account address.
  • the electronic device will fail to decrypt it. Ignore the target processing instruction.
  • the electronic device may also send a decryption failure message to prompt the decryption failure of the target processing instruction.
  • the electronic device transfers the credit certificate corresponding to the credit certificate transfer request from the debtor account address to the target account address.
  • the credit certificate transfer request is a request based on the private key encryption of the debtor account address.
  • the electronic device can decrypt the target account address based on the public key of the target account address, thereby transferring the requested credit certificate based on the content of the credit certificate transfer request.
  • the credit certificate should be transferred from the debtor account address to The creditor account address, but the confirmation instruction of the creditor account address has not been obtained, so it can be transferred to the above target account address first, so as to further transfer when the confirmation instruction is obtained subsequently.
  • the process of transferring the credit certificate by the electronic device may be: the electronic device may change the account address to which the credit certificate belongs to from the debtor account address to the target account address.
  • the process of transferring the credit certificate can also be implemented in other ways, for example, changing the storage address of the credit certificate from the debtor account address to the target account address, which is not limited in the embodiments of the present application.
  • the electronic device can transfer assets in the account of the supplier A (debtor account address) to the intermediate account based on the signature of the supplier A’s private key .
  • the electronic device obtains resource information of the creditor account address.
  • the creditor account address needs to transfer the target resource to the debtor account address when obtaining the credit certificate. Therefore, the electronic device can also first confirm whether the creditor account address includes the target resource, so that the creditor account address can be transferred When the capacity of the target resource is met, the subsequent steps of transferring the creditor's right certificate are executed.
  • the target device can provide a resource information acquisition service, and when the electronic device needs to acquire resource information of the creditor account address, it can send a resource information acquisition request to the target device, and the target device can acquire the resource information according to the resource information acquisition request. , Obtain and send the resource information of the creditor account address to the electronic device, so that the electronic device receives the resource information of the creditor account address.
  • the electronic device can also obtain the resource information of the creditor account address through other methods, for example, in a possible implementation manner, an account table can be maintained in the electronic device, and each account address can be stored in the account table Resource information, the electronic device can obtain resource information of the creditor account address from the account table. Specifically, the electronic device may obtain resource information corresponding to the identification information based on the identification information of the creditor account address, or may directly obtain based on the creditor account address, which is not limited in this embodiment of the present application.
  • the electronic device obtains a confirmation instruction of the creditor account address.
  • the electronic device After obtaining the resource information of the creditor account address, the electronic device can determine whether the creditor account address includes the target resource required to transfer the creditor's right certificate. If so, the electronic device can perform step 405.
  • the electronic device can check whether the bank or factoring company's account balance If it is greater than or equal to 186,000, if it is, the bank or factoring company is able to pay 186,000, and it can sign 200,000 digital assets.
  • the electronic device may send insufficient resource information, that is, when it is determined that the creditor account address does not include the target resource required to transfer the credit certificate based on the resource information of the creditor account address, the electronic device sends the resource Not enough news.
  • the electronic device can query the bank or Whether the factoring company's account balance is greater than or equal to 186,000. If not, the bank or factoring company is unable to pay 186,000, and it cannot sign 200,000 digital assets.
  • the electronic device determines that the creditor account address includes the target resource
  • the user of the creditor account address can perform a confirmation operation on his own user device, so that the user device can send a confirmation instruction to the electronic device.
  • the confirmation instruction can trigger the electronic device to perform the following steps 406 and 407 to realize the transfer process of the credit certificate.
  • the electronic device transfers the credit certificate from the target account address to the creditor account address.
  • this step 406 and the following step 407 can be executed.
  • the electronic device can obtain the confirmation of the creditor account address
  • the step 406 and the following step 407 may be executed within the preset time period of the instruction.
  • the embodiment of the present application does not limit which implementation manner is specifically adopted.
  • the electronic device can transfer the credit certificate from the target account address to the creditor account address, thus realizing the process of transferring from the debtor account address to the creditor account address.
  • the electronic device also needs to perform the following step 407, which will not be described in detail in the embodiments of the present application.
  • the electronic device may transfer assets from the intermediate account (target account address) to the account of financial institution A based on the signature of financial institution A’s private key.
  • the electronic device can destroy the target account address.
  • the electronic device can also store the target account address. If the creditor account address and debtor account address included in the subsequent claim transfer request are the same as the account address included in this claim transfer request, the target account can be directly used. The address is used to transfer the credit certificate to save the time and computing resources required for the process of generating the target account address.
  • the above steps 404 to 406 are the confirmation instructions based on the creditor account address, and the process of transferring the credit certificate from the target account address to the creditor account address.
  • the confirmation instruction of the creditor account address may be An instruction to encrypt based on the private key of the creditor's account address.
  • the electronic device receives the confirmation instruction, it can decrypt it based on the public key of the target account address to obtain the content of the confirmation instruction, confirming that the creditor account address corresponding to the confirmation instruction has the authority to process the target account address , So that this step 406 and the following step 407 can be performed.
  • the electronic device sends a resource transfer request to the target device.
  • the resource transfer request is used to instruct the target device to transfer the target resource from the creditor account address to the debtor account address, and the target resource is the resource that needs to be transferred out to obtain the credit certificate from the creditor account address.
  • the target device can provide a resource transfer service.
  • the electronic device confirms that resource transfer is required, it can send a resource transfer request to the target device to request the target device to perform the corresponding resource transfer process.
  • This step 407 is a process of sending a resource transfer request to the target device based on the confirmation instruction of the creditor account address.
  • the above steps 406 and 407 can confirm the receipt of the 200,000 digital assets transferred by the second-tier supplier for the bank or factoring company, and the electronic equipment will change the 200,000 digital assets of the second-tier supplier
  • the target account address is transferred to the bank or factoring company's account address, and 186,000 funds are transferred from the bank or factoring company's account to the secondary supplier's account.
  • step 406 may perform step 406 first, then step 407, or step 407, and then step 406.
  • step 406 and step 407 may also be executed at the same time.
  • the execution order of step 407 is not limited.
  • the electronic device can also record the result of the transfer of the creditor's right certificate or the resource transfer on the blockchain. Specifically, when transferring the credit certificate or transferring resources to any account address, the electronic device generates a block based on the transfer result, and when the blockchain system passes the consensus on the block, adds the block To the blockchain. In this way, the data on the blockchain can represent the generation process, transfer process and corresponding resource transfer of the credit certificate, ensuring the integrity of the data on the chain.
  • supplier A can choose the transfer signing mode and send the transfer to the blockchain system to the intermediate account (that is, the target account address)
  • the blockchain system can return the string to be signed.
  • the blockchain system can generate the intermediate account and transfer the assets to The intermediate account, and returns the transfer result to the supplier A.
  • the intermediate account address and the asset identification number (ID) in the intermediate account can also be returned.
  • This process corresponds to the above steps 401 to 403.
  • the financial institution A confirms the signing, it can send an application for confirming the signing of assets to the blockchain system.
  • the blockchain system can return the string to be signed. After the financial institution A can sign, it then submits the application for confirming the signing of assets to the blockchain system.
  • the blockchain system transfers the assets from the intermediate account to the financial institution A, and returns the transfer result, which corresponds to step 405 and step 406 described above.
  • a target account address can be generated based on the creditor account address and the debtor address, and the credit certificate can be transferred to the target account address for temporary storage, and when the confirmation instruction of the creditor account address is subsequently obtained Then transfer the credit certificate from the target account address to the creditor's account, temporarily store the credit certificate through the target account address, and the creditor account address will not be transferred repeatedly within the time period when the creditor account address is not signed, Therefore, the safety of the transfer of the creditor's right certificate can be guaranteed, and it can also be ensured that the creditor's account address can not be further processed before the signing of the creditor's account address, which effectively protects the rights of both parties to the transfer.
  • FIG. 9 is a flowchart of a method for transferring a creditor’s right certificate provided by an embodiment of the present application. Referring to FIG. 9, the method may include the following steps:
  • the electronic device receives a request to transfer a credit certificate.
  • This step 901 is the same as the above step 401.
  • the electronic device can receive the credit voucher transfer request and perform the following steps based on the credit voucher transfer request to generate the target account address and perform the credit voucher transfer.
  • the credit certificate corresponding to the credit certificate transfer request may be the existing credit certificate at the address of the debtor's account.
  • a first-tier supplier holds 1 million digital assets of a core enterprise, and the first-tier supplier wants to transfer all 1 million digital assets to a second-tier supplier.
  • the address of the debtor’s account in the transfer instruction, the secondary supplier is the address of the creditor’s account, and 1 million digital assets are the creditor’s certificate.
  • the credit certificate corresponding to the credit certificate transfer request may be a new credit certificate generated based on the existing credit certificate of the debtor's account address.
  • a tier one supplier holds 1 million digital assets of a core enterprise, and the tier one supplier wants to transfer the 500,000 digital assets from the 1 million digital assets to a tier two supplier, where the tier one supplier is The address of the debtor’s account in the transfer instruction of the right-to-transfer certificate, the secondary supplier is the address of the creditor’s account, and the 500,000 digital assets are the debt certificates.
  • the 500,000 digital assets are obtained based on the above 1 million digital assets. Therefore, after the transfer is successful, the primary supplier holds 500,000 digital assets of the core enterprise, and the secondary supplier holds 500,000 digital assets of the primary supplier.
  • the electronic device generates the target account address according to the debtor account address and the creditor account address in the request for transferring the credit certificate.
  • the electronic device transfers the credit certificate corresponding to the credit certificate transfer request from the debtor account address to the target account address.
  • the electronic device obtains the confirmation instruction of the creditor account address.
  • the electronic device transfers the credit certificate from the target account address to the creditor account address.
  • the steps 902 to 905 are the same as the above steps 402 to 403, step 405, and step 406.
  • the credit certificate The transfer is directly from one party to the other, and the other party does not need to pay other funds. Therefore, after step 903, the electronic device does not need to confirm whether the creditor account address includes the target resource, and directly transfers the credit certificate according to the confirmation instruction of the creditor account address. And after this step 905, the electronic device does not need to perform the same steps as the above step 407.
  • a target account address can be generated based on the creditor account address and the debtor address, and the credit certificate can be transferred to the target account address for temporary storage, when the confirmation instruction of the creditor account address is subsequently obtained Then transfer the credit certificate from the target account address to the creditor account, temporarily store the credit certificate through the target account address, and the creditor account address will not be transferred repeatedly within the time period when the creditor account address is not signed, Therefore, the security of the transfer of the creditor's right certificate can be guaranteed, and it can be ensured that the creditor's account can not be further processed before the signing of the creditor's account address, which effectively protects the rights of both parties to the transfer.
  • FIG. 10 is a schematic structural diagram of a credit certificate transfer device provided by an embodiment of the present application, which is applied to a node device in a blockchain system.
  • the device may include:
  • the generating module 1001 is configured to generate a target account address according to the debtor account address and the creditor account address in the transfer request of the creditor's right certificate, and the target account address is the temporary account address used to store the creditor's right certificate;
  • the transfer module 1002 is configured to transfer the credit certificate corresponding to the credit certificate transfer request from the debtor account address to the target account address;
  • the transfer module 1002 is also used to transfer the credit certificate from the target account address to the creditor account address based on the confirmation instruction of the creditor account address.
  • the generating module 1001 is used to:
  • the target account address is generated.
  • the generating module 1001 is used to:
  • the public key of the target account address is generated based on the public key of the debtor account address and the public key of the creditor account address.
  • the device further includes:
  • the decryption module is used for decrypting the target processing instruction based on the public key of the target account address when receiving the target processing instruction for the target account address, the target processing instruction is based on removing the creditor account address and the debtor Instructions for encryption of the private key of the account address other than the account address;
  • the ignore module is used to ignore the target processing instruction.
  • the claim transfer request is an encryption request based on the private key of the debtor account address
  • the confirmation instruction of the creditor account address is an instruction to encrypt based on the private key of the creditor account address.
  • the transfer module 1002 is used to:
  • the device further includes:
  • the first sending module is configured to send a resource shortage message when it is determined that the creditor account address does not include the target resource required for transferring the credit certificate based on the resource information of the creditor account address.
  • the device further includes:
  • the second sending module is used to send a resource transfer request to the target device based on the confirmation instruction of the creditor account address, the resource transfer request is used to instruct the target device to transfer the target resource from the creditor account address to the debtor account address, the target Resources are the resources that need to be transferred out of the creditor's account address to obtain the credit certificate.
  • the generation module 1001 is also used to generate a block based on the transfer result when transferring the credit certificate or transferring resources to any account address.
  • the block consensus is passed, the block is added to the blockchain.
  • the device provided in the embodiment of the present application can generate a target account address based on the creditor account address and the debtor address when transferring the credit certificate, and transfer the credit certificate to the target account address for temporary storage, and then obtain the creditor account address
  • the credit certificate is transferred from the target account address to the creditor’s account, and the credit certificate is temporarily stored through the target account address.
  • the time period when the creditor’s account address is not signed it can be guaranteed that the credit certificate will not The transfer is repeated, so as to ensure the security of the transfer of the credit certificate, and to ensure that the credit certificate will not be processed further before the creditor’s account address is signed, which effectively protects the rights of both parties.
  • the credit certificate transfer device provided in the above embodiment only uses the division of the above functional modules as an example to illustrate the transfer of the credit certificate.
  • the above functions can be allocated by different functional modules as needed That is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the debt voucher transfer device and the credit voucher transfer method embodiment provided in the above embodiments belong to the same concept. For the specific implementation process, refer to the method embodiments, and details are not described here.
  • the above electronic device may be provided as a terminal shown in FIG. 11 below, or may be provided as a server shown in FIG. 12 below, which is not limited in the embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • the terminal 1100 may be: a smartphone, a tablet computer, an MP3 player (Moving Pictures Experts Group Audio III), motion picture expert compression standard audio level 3), MP4 (Moving Pictures Experts Group Audio Audio Layer IV, motion picture expert compression standard audio Level 4) Player, laptop or desktop computer.
  • the terminal 1100 may also be called other names such as user equipment, portable terminal, laptop terminal, and desktop terminal.
  • the terminal 1100 includes a processor 1101 and a memory 1102.
  • the processor 1101 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on.
  • the processor 1101 may adopt at least one hardware form of DSP (Digital Signal Processing, digital signal processing), FPGA (Field-Programmable Gate Array), PLA (Programmable Logic Array). achieve.
  • the processor 1101 may also include a main processor and a coprocessor.
  • the main processor is a processor for processing data in a wake-up state, also known as a CPU (Central Processing Unit, central processing unit); the coprocessor is A low-power processor for processing data in the standby state.
  • the processor 1101 may be integrated with a GPU (Graphics Processing Unit, image processor), and the GPU is used to render and draw content that needs to be displayed on the display screen.
  • the processor 1101 may further include an AI (Artificial Intelligence, artificial intelligence) processor, which is used to process computing operations related to machine learning.
  • AI Artificial Intelligence, artificial intelligence
  • the memory 1102 may include one or more computer-readable storage media, which may be non-transitory.
  • the memory 1102 may further include a high-speed random access memory, and non-volatile memory, such as one or more magnetic disk storage devices and flash memory storage devices.
  • non-transitory computer-readable storage medium in the memory 1102 is used to store at least one instruction for execution by the processor 1101 to implement the credit certificate provided by the method embodiment of the present application Transfer method.
  • the terminal 1100 may optionally include a peripheral device interface 1103 and at least one peripheral device.
  • the processor 1101, the memory 1102 and the peripheral device interface 1103 may be connected by a bus or a signal line.
  • Each peripheral device may be connected to the peripheral device interface 1103 through a bus, a signal line, or a circuit board.
  • the peripheral device includes: at least one of a radio frequency circuit 1104, a touch display screen 1105, a camera 1106, an audio circuit 1107, a positioning component 1108, and a power supply 1109.
  • the peripheral device interface 1103 may be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 1101 and the memory 1102.
  • the processor 1101, the memory 1102, and the peripheral device interface 1103 are integrated on the same chip or circuit board; in some other embodiments, any one of the processor 1101, the memory 1102, and the peripheral device interface 1103 or Both can be implemented on a separate chip or circuit board, which is not limited in this embodiment.
  • the radio frequency circuit 1104 is used to receive and transmit RF (Radio Frequency) signals, also called electromagnetic signals.
  • the radio frequency circuit 1104 communicates with a communication network and other communication devices through electromagnetic signals.
  • the radio frequency circuit 1104 converts the electrical signal into an electromagnetic signal for transmission, or converts the received electromagnetic signal into an electrical signal.
  • the radio frequency circuit 1104 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a user identity module card, and so on.
  • the radio frequency circuit 1104 can communicate with other terminals through at least one wireless communication protocol.
  • the wireless communication protocol includes but is not limited to: metropolitan area networks, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity, wireless fidelity) networks.
  • the radio frequency circuit 1104 may further include NFC (Near Field Communication) related circuits, which is not limited in this application.
  • the display screen 1105 is used to display a UI (User Interface, user interface).
  • the UI may include graphics, text, icons, video, and any combination thereof.
  • the display screen 1105 also has the ability to collect touch signals on or above the surface of the display screen 1105.
  • the touch signal can be input to the processor 1101 as a control signal for processing.
  • the display screen 1105 can also be used to provide virtual buttons and/or virtual keyboards, also called soft buttons and/or soft keyboards.
  • the display screen 1105 there may be one display screen 1105, which is provided with the front panel of the terminal 1100; in other embodiments, there may be at least two display screens 1105, which are respectively provided on different surfaces of the terminal 1100 or have a folded design; In some other embodiments, the display screen 1105 may be a flexible display screen, which is disposed on the curved surface or folding surface of the terminal 1100. Even, the display screen 1105 can also be set as a non-rectangular irregular figure, that is, a special-shaped screen.
  • the display screen 1105 can be made of LCD (Liquid Crystal), OLED (Organic Light-Emitting Diode, organic light emitting diode) and other materials.
  • the camera assembly 1106 is used to collect images or videos.
  • the camera assembly 1106 includes a front camera and a rear camera.
  • the front camera is set on the front panel of the terminal, and the rear camera is set on the back of the terminal.
  • there are at least two rear cameras which are respectively one of the main camera, the depth-of-field camera, the wide-angle camera, and the telephoto camera, so as to realize the fusion of the main camera and the depth-of-field camera to realize the background blur function, the main camera Integrate with wide-angle camera to realize panoramic shooting and VR (Virtual Reality, virtual reality) shooting function or other fusion shooting functions.
  • the camera assembly 1106 may also include a flash.
  • the flash can be a single-color flash or a dual-color flash. Dual color temperature flash refers to the combination of warm light flash and cold light flash, which can be used for light compensation at different color temperatures.
  • the audio circuit 1107 may include a microphone and a speaker.
  • the microphone is used to collect sound waves of the user and the environment, and convert the sound waves into electrical signals and input them to the processor 1101 for processing, or input them to the radio frequency circuit 1104 to realize voice communication.
  • the microphone can also be an array microphone or an omnidirectional acquisition microphone.
  • the speaker is used to convert the electrical signal from the processor 1101 or the radio frequency circuit 1104 into sound waves.
  • the speaker can be a traditional thin-film speaker or a piezoelectric ceramic speaker.
  • the speaker When the speaker is a piezoelectric ceramic speaker, it can not only convert electrical signals into sound waves audible by humans, but also convert electrical signals into sound waves inaudible to humans for distance measurement and other purposes.
  • the audio circuit 1107 may further include a headphone jack.
  • the positioning component 1108 is used to locate the current geographic location of the terminal 1100 to implement navigation or LBS (Location Based Service, location-based service).
  • the positioning component 1108 may be a positioning component based on the GPS (Global Positioning System) of the United States, the Beidou system of China, the Grenas system of Russia, or the Galileo system of the European Union.
  • the power supply 1109 is used to supply power to various components in the terminal 1100.
  • the power supply 1109 may be alternating current, direct current, disposable batteries, or rechargeable batteries.
  • the rechargeable battery may support wired charging or wireless charging.
  • the rechargeable battery can also be used to support fast charging technology.
  • the terminal 1100 further includes one or more sensors 1110.
  • the one or more sensors 1110 include, but are not limited to, an acceleration sensor 1111, a gyro sensor 1112, a pressure sensor 1113, a fingerprint sensor 1114, an optical sensor 1115, and a proximity sensor 1116.
  • the acceleration sensor 1111 can detect the magnitude of acceleration on the three coordinate axes of the coordinate system established with the terminal 1100.
  • the acceleration sensor 1111 can be used to detect components of gravity acceleration on three coordinate axes.
  • the processor 1101 may control the touch display screen 1105 to display the user interface in a landscape view or a portrait view according to the gravity acceleration signal collected by the acceleration sensor 1111.
  • the acceleration sensor 1111 can also be used for game or user movement data collection.
  • the gyro sensor 1112 can detect the body direction and the rotation angle of the terminal 1100, and the gyro sensor 1112 can cooperate with the acceleration sensor 1111 to collect a 3D action of the user on the terminal 1100.
  • the processor 1101 can realize the following functions according to the data collected by the gyro sensor 1112: motion sensing (such as changing the UI according to the user's tilt operation), image stabilization during shooting, game control, and inertial navigation.
  • the pressure sensor 1113 may be disposed on the side frame of the terminal 1100 and/or the lower layer of the touch display 1105.
  • the pressure sensor 1113 can detect the user's grip signal on the terminal 1100, and the processor 1101 can perform left-right hand recognition or shortcut operation according to the grip signal collected by the pressure sensor 1113.
  • the processor 1101 controls the operability control on the UI interface according to the pressure operation of the user on the touch screen 1105.
  • the operability control includes at least one of a button control, a scroll bar control, an icon control, and a menu control.
  • the fingerprint sensor 1114 is used to collect the user's fingerprint, and the processor 1101 recognizes the user's identity according to the fingerprint collected by the fingerprint sensor 1114, or the fingerprint sensor 1114 recognizes the user's identity according to the collected fingerprint. When the user's identity is recognized as a trusted identity, the processor 1101 authorizes the user to perform related sensitive operations, including unlocking the screen, viewing encrypted information, downloading software, paying, and changing settings.
  • the fingerprint sensor 1114 may be disposed on the front, back, or side of the terminal 1100. When a physical button or manufacturer logo is provided on the terminal 1100, the fingerprint sensor 1114 may be integrated with the physical button or manufacturer logo.
  • the optical sensor 1115 is used to collect the ambient light intensity.
  • the processor 1101 can control the display brightness of the touch display 1105 according to the ambient light intensity collected by the optical sensor 1115. Specifically, when the ambient light intensity is high, the display brightness of the touch display 1105 is increased; when the ambient light intensity is low, the display brightness of the touch display 1105 is decreased.
  • the processor 1101 can also dynamically adjust the shooting parameters of the camera assembly 1106 according to the ambient light intensity collected by the optical sensor 1115.
  • the proximity sensor 1116 also called a distance sensor, is usually provided on the front panel of the terminal 1100.
  • the proximity sensor 1116 is used to collect the distance between the user and the front of the terminal 1100.
  • the processor 1101 controls the touch display 1105 to switch from the bright screen state to the breathing state; when the proximity sensor 1116 detects When the distance from the user to the front of the terminal 1100 gradually becomes larger, the processor 1101 controls the touch display screen 1105 to switch from the screen-on state to the screen-on state.
  • FIG. 11 does not constitute a limitation on the terminal 1100, and may include more or fewer components than those illustrated, or combine certain components, or adopt different component arrangements.
  • FIG. 12 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the server 1200 may have a relatively large difference due to different configurations or performances, and may include one or more than one processor (central processing units (CPU) 1201 and one Or more than one memory 1202, wherein at least one computer-readable instruction is stored in the memory 1202, and the at least one computer-readable instruction is loaded and executed by the processor 1201 to implement the method of transferring creditor's rights provided by the foregoing method embodiments .
  • the server may also have components such as a wired or wireless network interface, a keyboard, and an input-output interface for input and output.
  • the server may also include other components for implementing device functions, which will not be repeated here.
  • a computer-readable storage medium is also provided, for example, a memory including computer-readable instructions, which can be executed by a processor to complete the method of transferring creditor's rights in the foregoing embodiments.
  • the computer-readable storage medium may be read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), read-only compact disc (Compact Disc Read-Only Memory, CD-ROM), Magnetic tapes, floppy disks, optical data storage devices, etc.
  • the computer-readable instructions may be stored in a computer-readable storage In the medium, the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention concerne un procédé de transfert de certificat de dette. Le procédé comprend les étapes consistant à : générer une adresse de compte cible selon une adresse de compte débiteur et une adresse de compte créancier dans une demande de transfert de certificat de dette, l'adresse de compte cible étant une adresse de compte temporaire utilisée pour stocker le certificat de dette ; transférer un certificat de dette correspondant à la demande de transfert de certificat de dette entre l'adresse de compte débiteur et l'adresse de compte cible ; et transférer le certificat de dette entre l'adresse de compte cible et l'adresse de compte créancier sur la base d'une instruction de confirmation provenant de l'adresse de compte créancier.
PCT/CN2019/120957 2018-12-05 2019-11-26 Procédé et appareil de transfert de certificat de dette, dispositif électronique et support de stockage WO2020114279A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/231,471 US11978115B2 (en) 2018-12-05 2021-04-15 Method, device, and storage medium for blockchain data processing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811483001.0 2018-12-05
CN201811483001.0A CN109615515B (zh) 2018-12-05 2018-12-05 债权凭证转移方法、装置、电子设备及存储介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/231,471 Continuation US11978115B2 (en) 2018-12-05 2021-04-15 Method, device, and storage medium for blockchain data processing

Publications (1)

Publication Number Publication Date
WO2020114279A1 true WO2020114279A1 (fr) 2020-06-11

Family

ID=66005571

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/120957 WO2020114279A1 (fr) 2018-12-05 2019-11-26 Procédé et appareil de transfert de certificat de dette, dispositif électronique et support de stockage

Country Status (3)

Country Link
US (1) US11978115B2 (fr)
CN (1) CN109615515B (fr)
WO (1) WO2020114279A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109345389A (zh) * 2018-09-25 2019-02-15 阿里巴巴集团控股有限公司 一种资源分享方法、装置及设备
CN109615515B (zh) * 2018-12-05 2021-08-24 腾讯科技(深圳)有限公司 债权凭证转移方法、装置、电子设备及存储介质
CN110599384B (zh) * 2019-09-12 2023-07-18 腾讯科技(深圳)有限公司 组织关系的转移方法、装置、设备及存储介质
CN112543103A (zh) * 2019-09-23 2021-03-23 百度在线网络技术(北京)有限公司 账户地址的生成方法和校验方法、装置、设备和介质
CN110912974A (zh) * 2019-11-11 2020-03-24 深圳市亦区科技有限公司 资源处理方法、装置、电子设备及计算机可读取存储介质
CN110889758B (zh) * 2019-11-15 2023-06-23 安徽海汇金融投资集团有限公司 一种债权流转体系的构建方法及系统
CN110852864B (zh) * 2019-11-15 2023-07-18 腾讯科技(深圳)有限公司 一种数字资源量的处理方法、装置及存储介质
CN111314066B (zh) * 2020-01-23 2022-02-11 腾讯科技(深圳)有限公司 基于区块链的数据转移方法、终端及计算机可读存储介质
CN111401888B (zh) * 2020-03-05 2023-07-07 北京庚金科技有限公司 一种生成多重签名钱包的方法及装置
CN112767147B (zh) * 2020-12-31 2023-03-28 山东数字能源交易有限公司 一种债权信息的处理方法和装置
CN117501258A (zh) * 2022-05-31 2024-02-02 京东方科技集团股份有限公司 资金流转系统、方法及装置
CN115659313B (zh) * 2022-12-08 2023-04-07 广州简悦信息科技有限公司 账号数据处理方法、设备、存储介质及程序产品
CN115879161B (zh) * 2023-02-23 2023-05-23 西南交通大学 一种数据流转方法、装置、设备及可读存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170132615A1 (en) * 2015-11-11 2017-05-11 Bank Of America Corporation Block chain alias for person-to-person payments
CN107038578A (zh) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 基于区块链的数据交易平台中多重签名交易信息处理方法
CN107424073A (zh) * 2017-07-17 2017-12-01 杭州复杂美科技有限公司 一种跨链数字债权交易的方法
CN108009811A (zh) * 2017-11-30 2018-05-08 中国人民解放军国防科技大学 一种面向云际计算环境价值交换的跨链通信方法
CN109615515A (zh) * 2018-12-05 2019-04-12 腾讯科技(深圳)有限公司 债权凭证转移方法、装置、电子设备及存储介质

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104978687A (zh) * 2014-04-08 2015-10-14 陈衡 债权转让处理装置及方法
US11392955B2 (en) * 2015-05-20 2022-07-19 Ripple Luxembourg S.A. Temporary consensus networks in a resource transfer system
US9792782B1 (en) * 2016-05-17 2017-10-17 Visa International Service Association Systems and methods for transferring resource access
CN108876497B (zh) * 2017-05-11 2022-03-29 腾讯科技(深圳)有限公司 资源转移方法、装置及第三方服务器
CN107220820B (zh) * 2017-05-16 2019-10-01 腾讯科技(深圳)有限公司 资源转移方法、装置及存储介质
CN107301536B (zh) * 2017-06-12 2019-07-12 腾讯科技(深圳)有限公司 资源转移方法及装置
CN108428122B (zh) * 2018-02-08 2021-02-12 布比(北京)网络技术有限公司 一种分布式账本上的贸易融资方法及系统
CN110363665B (zh) * 2018-06-11 2021-10-26 腾讯科技(深圳)有限公司 债权数据处理方法、装置、设备及介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170132615A1 (en) * 2015-11-11 2017-05-11 Bank Of America Corporation Block chain alias for person-to-person payments
CN107038578A (zh) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 基于区块链的数据交易平台中多重签名交易信息处理方法
CN107424073A (zh) * 2017-07-17 2017-12-01 杭州复杂美科技有限公司 一种跨链数字债权交易的方法
CN108009811A (zh) * 2017-11-30 2018-05-08 中国人民解放军国防科技大学 一种面向云际计算环境价值交换的跨链通信方法
CN109615515A (zh) * 2018-12-05 2019-04-12 腾讯科技(深圳)有限公司 债权凭证转移方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN109615515A (zh) 2019-04-12
CN109615515B (zh) 2021-08-24
US20210248675A1 (en) 2021-08-12
US11978115B2 (en) 2024-05-07

Similar Documents

Publication Publication Date Title
WO2020114279A1 (fr) Procédé et appareil de transfert de certificat de dette, dispositif électronique et support de stockage
WO2020114266A1 (fr) Procédé et appareil de transfert de ressources, dispositif électronique, et support de stockage
CN110457946B (zh) 数字资产生成方法、装置、电子设备及存储介质
CN109523413B (zh) 保单处理方法、装置、计算机设备及存储介质
CN110245144B (zh) 协议数据管理方法、装置、存储介质及系统
US20220224677A1 (en) User inviting method and apparatus, computer device, and computer-readable storage medium
CN111080443B (zh) 基于区块链的业务处理方法、装置、设备及存储介质
EP4009187A1 (fr) Procédé et appareil de traitement de blocs, et procédé et appareil d'interrogation de données à base d'une chaîne de blocs
CN108805560B (zh) 数值整合方法、装置、电子设备及计算机可读存储介质
CN110598482A (zh) 基于区块链的数字证书管理方法、装置、设备及存储介质
WO2020258748A1 (fr) Système, procédé et appareil de rattachement de carte bancaire, et dispositif et support de stockage
CN110826103B (zh) 基于区块链的文档权限处理方法、装置、设备及存储介质
CN110555780B (zh) 基于区块链的保险数据处理方法、装置、设备及存储介质
CN110322151A (zh) 平台入驻系统、方法、设备及存储介质
CN111260347A (zh) 基于区块链的资源处理方法、装置、设备及存储介质
CN111212074B (zh) 基于区块链的资格认定方法、装置、设备及存储介质
CN111667371B (zh) 基于区块链的资源聚合方法、系统、设备及存储介质
CN110677262B (zh) 基于区块链的信息公证方法、装置及系统
CN112036887A (zh) 资源转移的方法、装置、设备及存储介质
CN110659975B (zh) 基于区块链的资源转移方法、装置、设备及存储介质
CN111694892B (zh) 资源转移方法、装置、终端、服务器及存储介质
CN111191254B (zh) 访问校验方法、装置、计算机设备及存储介质
CN112991069A (zh) 资源处理方法、装置、设备及存储介质
CN111681098A (zh) 资源转移方法、装置、服务器及计算机可读存储介质
CN111028059B (zh) 基于区块链的物品交换方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19894360

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19894360

Country of ref document: EP

Kind code of ref document: A1